4,857 research outputs found

    The Imperial Discourse and Roger’s Tragic Death in “Aloewood Incense: Second Burning”

    Get PDF
    Some scholars hold that Roger’s death in “Aloewood Incense: Second Burning” (1943) was caused by the repulsion from his colleagues and students, this paper, however, maintains that the imperial discourse regarding sexuality and the grand design of colonialism deprived Roger of a sense of belonging in Hong Kong and marginalised him, leaving him with nothing but alienation within the diasporic community and no choice but death. Chang’s exposure of the devastating effect of imperial discourse on its expatriates denounced the superiority of the western culture, indicating her sharp vision as an intellectual

    Ethnicity and the Subjectivity of Malaysian-Chinese Diasporic Writers

    Get PDF
    Diasporic writers are blessed with two cultures. Their choice of which culture to identify with may be promoted by social circumstances. During the 1970s and the 1980s when Malaysia prioritized the Malays and the Chinese were marginalized and reduced to an inferior position in the country, Malaysian-Chinese writers turned traditional Chinese culture into cultural capital to bring comfort and consolation for their community. Besides, they wrote to protest the country’s unfair treatment of the Chinese, lamented the aphasiac state of their fellowmen and defied the nation’s actualizing attempts to stifle the ethnicity of the Chinese. The Malaysian-Chinese writers’ choice of ethnic identity indicated that they were not passive targets to consent the power of the dominant discourse; and it highlighted their subjectivity as diasporic writers

    Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    Full text link
    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.Comment: 6 pages, 3 figure

    Kinetic study of goethite dehydration and the effect of aluminium substitution on the dehydrate

    Get PDF
    Goethite and Al-substituted goethite were synthesized and were characterized using XRD and XRF. The kinetic study of goethite dehydrate was investigated by TG and DTG at different heating rates (2, 5, 10, 15, 20 â—¦C/min) and the effect of Al substitution for Fe on dehydrate was studied. The results showed that two types of absorbed water with the same Ed values of 3.4, 6.2 kJ/mol were confirmed on goethite and Alsubstituted goethite. Three types of hydroxyl units were proved, one being on the surface and the other two being in the structure of goethite. The substitution of Al for Fe in the structure of goethite decreases the desorption rate of hydroxyl, increases the dehydroxylation temperature, broadens the desorption peaks in DTG curves, and improves the Ed values from 19.4, 20.4, 26.1 kJ/mol to 21.6, 30, 33.6 kJ/mol when Al substitution comes to 9.1%
    • …
    corecore